Cyber og Sundhed. Hvad sker der og hvordan? Morten von Seelen, Cyber Ops

Relaterede dokumenter
HACKERNE BLIVER BEDRE, SYSTEMERNE BLIVER MERE KOMPLEKSE OG PLATFORMENE FORSVINDER HAR VI TABT KAMPEN? MARTIN POVELSEN - KMD

DET KONGELIGE BIBLIOTEK NATIONALBIBLIOTEK OG KØBENHAVNS UNIVERSITETS- BIBLIOTEK. Index

SIEM hvilken løsning skal du vælge? Claus Løppenthien, Dubex A/S, 12. maj 2015

LESSON NOTES Extensive Reading in Danish for Intermediate Learners #8 How to Interview

Project Step 7. Behavioral modeling of a dual ported register set. 1/8/ L11 Project Step 5 Copyright Joanne DeGroat, ECE, OSU 1

Managing Risk Enabling Growth Through Compliance! Alex Sinvani Copenhagen,

Opdag avancerede angreb hurtigt så du kan agere på dem. Henrik Larsson, Senior Security Consultant, Dubex Vejlefjord den 21.

Sport for the elderly

CONNECTING PEOPLE AUTOMATION & IT

Portal Registration. Check Junk Mail for activation . 1 Click the hyperlink to take you back to the portal to confirm your registration

Business casen ved implementering af Log Management. Claus Løppenthien, Hotel Vejlefjord, 21. maj 2015

IBM Network Station Manager. esuite 1.5 / NSM Integration. IBM Network Computer Division. tdc - 02/08/99 lotusnsm.prz Page 1

Security & Risk Management Update 2017

Teknologispredning i sundhedsvæsenet DK ITEK: Sundhedsteknologi som grundlag for samarbejde og forretningsudvikling

IPv6 Application Trial Services. 2003/08/07 Tomohide Nagashima Japan Telecom Co., Ltd.

Hvordan sikres personfølsomme data - og adgangen til disse så persondataloven overholdes. Klaus Kongsted, CRO, Dubex A/S Dubex A/S, den 5.

Information Lifecycle Management

MOC On-Demand Administering System Center Configuration Manager [ ]

Status på det trådløse netværk

Vina Nguyen HSSP July 13, 2008

QUICK START Updated: 18. Febr. 2014

Cisco Cloud Networking. Cisco Meraki - En ny måde at lave netværk på Morten Rundager Solutions Specialist Cisco Danmark 29/

Identity & Access Governance seminar Launching your IAG-as-aservice. 25. November 2015

Asking whether there are commission fees when you withdraw money in a certain country

Asking whether there are commission fees when you withdraw money in a certain country

Kalkulation: Hvordan fungerer tal? Jan Mouritsen, professor Institut for Produktion og Erhvervsøkonomi

QUICK START Updated:

IT-sikkerhed som et byggeprojekt?

Melbourne Mercer Global Pension Index

Strategisk informationssikkerhed

Databeskyttelse: Afrunding. Jacob Herbst, CTO, Dubex A/S Dubex A/S, den 11. juni 2015

Backup Applikation. Microsoft Dynamics C5 Version Sikkerhedskopiering

OPDAG ANGREB OG REAGÉR HURTIGT

ECE 551: Digital System * Design & Synthesis Lecture Set 5

Aktivitet Dag Start Lektioner Uge BASP0_V1006U_International Human Resource Management/Lecture/BASP0V1006U.LA_E15 onsdag 11:

EPJ udviking visionen og vejen derhen

Managing stakeholders on major projects. - Learnings from Odense Letbane. Benthe Vestergård Communication director Odense Letbane P/S

Experience. Knowledge. Business. Across media and regions.

Hvor er mine runde hjørner?

USERTEC USER PRACTICES, TECHNOLOGIES AND RESIDENTIAL ENERGY CONSUMPTION

Cross-Sectorial Collaboration between the Primary Sector, the Secondary Sector and the Research Communities

Immigration Bank. Bank - Generelt. Bank - At åbne en bankkonto. Spørg om der er gebyr når du hæver penge i et bestemt land

Trolling Master Bornholm 2016 Nyhedsbrev nr. 5

Financial Literacy among 5-7 years old children

Engelsk. Niveau D. De Merkantile Erhvervsuddannelser September Casebaseret eksamen. og

Hosted CRM Outlook client connector setup guide. Date: Version: 1. Author: anb. Target Level: Customer. Target Audience: End User

INGEN HASTVÆRK! NO RUSH!

Aktivitet Dag Start Lektioner Uge BASP0_V1006U_International Human Resource Management/Lecture/BASP0V1006U.LA_E15onsdag 11:

VPN VEJLEDNING TIL MAC

Sådan får du styr på de digitale risici

Status fra Sikkerhedsfronten. Jens Borup Pedersen DK-CERT/DeiC

Growth. Bahrain. Growthisneverbymerechance;itisthe resultofforcesworkingtogether. Oman Kuwait. JamesCashPenney. SaudiArabia

It-sikkerhedsstrategi i kommuner hvad giver mening at varetage internt og hvad kan outsources?

SAS USER FORUM DENMARK 2017 USER FORUM. Rune Nordtorp

DSB s egen rejse med ny DSB App. Rubathas Thirumathyam Principal Architect Mobile

PARALLELIZATION OF ATTILA SIMULATOR WITH OPENMP MIGUEL ÁNGEL MARTÍNEZ DEL AMOR MINIPROJECT OF TDT24 NTNU

Basic statistics for experimental medical researchers

Brug sømbrættet til at lave sjove figurer. Lav fx: Få de andre til at gætte, hvad du har lavet. Use the nail board to make funny shapes.

Hosted CRM Outlook client connector setup guide. Date: Version: 1. Author: anb. Target Level: Customer. Target Audience: End User

HVAD ER VÆRDIEN AF ANALYTICS FOR DIN VIRKSOMHED

OT Security. 17 november 2016

Vores mange brugere på musskema.dk er rigtig gode til at komme med kvalificerede ønsker og behov.

Sikre apps på ios og Android. Mads Jensen & Søren

Hvad skal vi leve af i fremtiden?

Shared space - mellem vision og realitet. - Lyngby Idrætsby som case

Når fremtiden møder udbudsloven

dansk tv guide 4FF5B32E065D94EADE23B49ADD83576C Dansk Tv Guide

Agenda. The need to embrace our complex health care system and learning to do so. Christian von Plessen Contributors to healthcare services in Denmark

1 What is the connection between Lee Harvey Oswald and Russia? Write down three facts from his file.

CONNECTING PEOPLE AUTOMATION & IT

IBM Software Group. SOA v akciji. Srečko Janjić WebSphere Business Integration technical presales IBM Software Group, CEMA / SEA IBM Corporation

Interne og eksterne trusler Sådan håndterer vi trusler fra remote access/ad-hoc adgange fra medarbejdere og leverandører

Security & Risk Management Summit

Microsoft Dynamics C5. Nyheder Kreditorbetalinger

BACK-END OG DATA: ADMINISTRATION HVAD ER DE NYE MULIGHEDER MED VERSION 7.1? STEFFEN BILLE RANNES, 4. FEBRUAR 2015

xrm både en applikation og en ramme for hurtig udvikling af løsninger til strukturet relationshåndtering og understøttelse af forretningsprocesser

GUIDE TIL BREVSKRIVNING

JOHN LENNON (DANISH EDITION) BY CYNTHIA LENNON

Rådgiverbranchen og den digitale transformation

Revision af firewall. Jesper B. S. Christensen. Sikkerhed og Revision 6/7 September 2018

SAS Data Governance Hvad er det, og hvordan kommer man i gang? Frans Holm, Advisor Data Management/SAS Platform

Engelsk. Niveau C. De Merkantile Erhvervsuddannelser September Casebaseret eksamen. og

Syddjurs Kommune Cyber Maturity Assessment

Our activities. Dry sales market. The assortment

Fejlbeskeder i SMDB. Business Rules Fejlbesked Kommentar. Validate Business Rules. Request- ValidateRequestRegist ration (Rules :1)

Hackingens 5 faser. Kim Elgaard, Solution Engineer, Dubex A/S. 21. marts 2017

Mobil Awareness 2011 CSIS Security Group

WIKI & Lady Avenue New B2B shop

how to save excel as pdf

Finn Gilling The Human Decision/ Gilling September Insights Danmark 2012 Hotel Scandic Aarhus City

Integrated Total Facility Management for Real Estate, Infrastructure & Facility Management

Hvorfor opgradere til Microsoft 365? Få en kort introduktion til Microsoft 365 og de 7 største grunde til at opgradere

ESG reporting meeting investors needs

Trolling Master Bornholm 2015

How Long Is an Hour? Family Note HOME LINK 8 2

IBM Watson & Cognitive IoT. Sebastian Slej Channel Manager IBM Analytics

Eksempel på eksamensspørgsmål til caseeksamen

Overfør fritvalgskonto til pension

Time- og eksamensplaner, efterår 2014

Security as a Service hvorfor, hvornår og hvordan. Gorm Mandsberg, gma@dubex.dk Aarhus,

Transkript:

Cyber og Sundhed Hvad sker der og hvordan? Morten von Seelen, Cyber Ops

The bomber will always get through I think it is well also for the man in the street to realise that there is no power on earth that can protect him from being bombed. Whatever people may tell him, the bomber will always get through The only defence is in offence, which means that you have to kill more women and children more quickly than the enemy if you want to save yourselves...if the conscience of the young men should ever come to feel, with regard to this one instrument [bombing] that it is evil and should go, the thing will be done; but if they do not feel like that well, as I say, the future is in their hands. But when the next war comes, and European civilisation is wiped out, as it will be, and by no force more than that force, then do not let them lay blame on the old men. Let them remember that they, principally, or they alone, are responsible for the terrors that have fallen upon the earth.[2][3][4] 2

Meget aktuelt 3

Truslen kommer udefra. Punktum. Kilde: Verizon/Deloitte Data Breach Investigations Report 2015 4

5 Deloitte Copyright 2016 Deloitte & Touche Oy. All rights reserved.

6 Deloitte Copyright 2016 Deloitte & Touche Oy. All rights reserved.

1. Mangel på tid, budget og ekspertise til at gennemføre omfattende sikkerhedsfunktioner. 2. Ingen dedikeret IT-sikkerhed folk på lønningslisten. 3. Manglende kendskab til risiko. 4. Fravær af systemoverblik og dokumentation 5. Mangel på medarbejderuddannelse. 6. Manglende opdatering af systemer. 7. Outsourcing af sikkerhed til ukvalificeret 3. part eller systemadministratorer 8. Manglende hardning af endpoints 7

High Risk Locations Client specific biz. Vendors Fourth Party Third Parties Client specific Industry specific Remote connections (VPN, File transfer) Cloud/SaaS Connections Infrastructure B2B Connections Databases Personal Computers Geographic core location Access Control Security Measure s Security & Monitoring Inadvertent Damage Human Elements Malicious Exfiltration Physical Locations Cyber Internally hosted Building Access 8 Deloitte Copyright 2016 Deloitte & Touche Oy. All rights reserved. Organization Off-the-shelf Applications (Web)- applications Third party hosted Mobile Applications

Fælles MO Sådan angribes virksomhederne anno 2016 1. Phishing (ransomware etc.) 2. Social Engineering 3. CEO/ BEC Fraud 4. Network hacking (including wifi) 5. Website hacking 6. Social Media Hacking 9

Ransomware Moderne landevejsrøveri 10

11 Deloitte Copyright 2016 Deloitte & Touche Oy. All rights reserved.

12 Deloitte Copyright 2016 Deloitte & Touche Oy. All rights reserved.

Phishing Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. [1][2] 13

Deloitte Phishing test 2016 Deloitte 14 14

Results of the simulation are summarized on the chart: 2016 Deloitte 15 15

Social Engineering Phishing 16

Social Engineering Phishing 17

18 Deloitte Copyright 2016 Deloitte & Touche Oy. All rights reserved.

CEO Fraud / BEC Fraud 19

Social Media Hacking 20

Network Attack Sårbarheder giver adgang længere ind I virksomheden 21

Network Attack - Wifi 22

Man kan komme ind på Netværket på flere måder 2016 Deloitte 23 23

Webhacking 24

Hvor vil I ligge? Snak om det! Operational Excellence Military & Defence Situational Awareness of Cyber Threats Basic Online Brand Monitoring Online Brand & Social Media Policing Brand Monitoring Proactive Threat Management Blissful Ignorance Basic Network Protection Consumer Business & Life Sciences Acceptable Usage Policy IT BC & DR Exercises Transformation Ad Hoc Infrastructure & Application Protection Ad Hoc System / Malware Forensics Ad-hoc Threat Intelligence Sharing with Peers Commercial & Open Source Threat Intelligence Feeds Network & System Centric Activity Profiling General Information Security Training & Awareness IT Cyber Attack Simulations Enterprise-Wide Infrastructure & Application Protection Automated Malware Forensics & Manual Electronic Discovery Government / Sector Threat Intelligence Collaboration Criminal / Hacker Surveillance Workforce / Customer Behaviour Profiling Targeted Intelligence-Based Cyber Security Awareness Business-Wide Cyber Attack Exercises Identity-Aware Information Protection Automated Electronic Discovery & Forensics Global Cross-Sector Threat Intelligence Sharing Baiting & Counter-Threat Intelligence Real-time Business Risk Analytics & Decision Support Business Partner Cyber Security Awareness Sector-Wide & Supply Chain Cyber Attack Exercises Adaptive & Automated Security Control Updates E-Discovery & Forensics Intelligence Collaboration External Threat Intelligence Behavioural Analytics Training & Awareness Cyber Attack Preparation Asset Protection IT Service Desk & Whistleblowing Security Log Collection & Ad Hoc Reporting 24x7 Technology Centric Security Event Reporting External & Internal Threat Intelligence Correlation Cross-Channel Malicious Activity Detection Security Event Monitoring Traditional Signature-Based Security Controls Periodic IT Asset Vulnerability Assessments Automated IT Asset Vulnerability Monitoring Targeted Cross-Platform User Activity Monitoring Tailored & Integrated Business Process Monitoring Internal Threat Intelligence Cyber Security Maturity Levels Level 1 Level 2 Level 3 Level 4 Level 5 2016 Deloitte AS 25

Vores (forsøg på en) løsning: Overblik! Kend jeres svagheder og trusler Stil krav om overblik! 26

Spørg jer selv 1. Er vores SPF1 record opsat korrekt? 2. Hvor længe må vi højest være nede pga. IT-nedbrud? 3. Er ansvaret for sikkerheden defineret? 4. Har vi 2. factor autentificering på adgang udefra? 5. Beskytter vores ansatte, virksomhedens oplysninger med password som: [virksomhedsnavn][årstal]? 6. Er vores IT-sikkerhedes politik up to date med modern trusler? 7. Er vores netværk VLAN segmenteret? 8. Overlever vores backup selvom det er en IT-medarbejder som bliver ramt af ransomware? 9. Har vi procedure på plads for overførsel af penge? 10.Opsamler vi logfiler et central sted? 11.Dækker vores beredskabsplaner cyber terror? 12.Er vores lokale maskiner sikret med andet end Antivirus? 13.Har vi styr på Databehandleraftalerne? 14.Gemmer medarbejdere følsomme dokumenter på deres bærbare hvis ja, er der så kryptering på denne? 15.Er vi klar til GDPR? 16.Er adgangen til de finansielle systemer tilpas sikre? 17.Ved ledelsen rent faktisk, hvordan tilstanden er I virksomheden på IT-sikkerheds området? 18.Kan vores IT ansatte løfte opgaven ved et rigtigt hackerangreb? 19.Har I selv kommunikeret kravene til sikkerhed tydeligt nok? 27

Morten von Seelen mvonseelen@deloitte.dk 3093 5033 02.02.2017